Zobrazeno 1 - 10
of 79
pro vyhledávání: '"Michel van Eeten"'
Autor:
Daiki Chiba, Mitsuaki Akiyama, Yuto Otsuki, Hiroki Hada, Takeshi Yagi, Tobias Fiebig, Michel Van Eeten
Publikováno v:
IEEE Access, Vol 10, Pp 34352-34368 (2022)
Security Operations Centers (SOCs) are in need of automation for triaging alerts. Current approaches focus on analyzing and enriching individual alerts. We take a different approach and analyze the population of alerts. In an observational study over
Externí odkaz:
https://doaj.org/article/f85c9b3882f0466ebec117f107c1aadb
Publikováno v:
Internet Policy Review, Vol Volume 7, Iss Issue 3 (2018)
The debate about how to govern personal data has intensified in recent years. The European Union’s General Data Protection Regulation, which came into effect in May 2018, relies on transparency mechanisms codified through obligations for organisati
Externí odkaz:
https://doaj.org/article/26b9ece4984a4e4d8144a9984a324975
Publikováno v:
IEEE Security & Privacy
We outline possible approaches to cybersecurity governance and compare them against the proposed European Union network of competence centers. We survey stakeholders for their opinions about the centers and analyze the results.
Autor:
Arwa Abdulkarim Al Alsadi, Kaichi Sameshima, Jakob Bleier, Katsunari Yoshioka, Martina Lindorfer, Michel van Eeten, Carlos H. Gañán
Publikováno v:
ASIA CCS 2022-Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security
The Internet of things (IoT) is composed by a wide variety of software and hardware components that inherently contain vulnerabilities. Previous research has shown that it takes only a few minutes from the moment an IoT device is connected to the Int
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b8fa628b708b17919eeb0ce30a656455
https://doi.org/10.1145/3488932.3517408
https://doi.org/10.1145/3488932.3517408
Autor:
Nicolas Christin, Alejandro Cuevas, Tyler Moore, Michel van Eeten, Mathew Vermeer, Tobias Fiebig, Jonathan West, Shuonan Niu, Carlos Gañán
Publikováno v:
EuroS&P
Asset discovery is fundamental to any organization's cybersecurity efforts. Indeed, one must accurately know which assets belong to an IT infrastructure before the infrastructure can be secured. While practitioners typically rely on a relatively smal
Autor:
Elsa Turcios Rodriguez, Arman Noroozian, Daisuke Inoue, Carlos Gañán, Susanne Verstegen, Takahiro Kasama, Michel van Eeten
Publikováno v:
Journal of Cybersecurity, 7(1)
Internet Service Providers (ISPs) are getting involved in remediating Internet of Things (IoT) infections of end users. This endeavor runs into serious usability problems. Given that it is usually unknown what kind of device is infected, they can onl
Autor:
Dawn Branley-Bell, Lynne Coventry, Jhoties Sewnandan, Pamela Briggs, Wolter Pieters, Michel van Eeten, Ines Martinez, Katsiaryna Labunets
Publikováno v:
Security Risk Models for Cyber Insurance ISBN: 9780429329487
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3ce93c7a2a39b351436a3bed65926123
https://doi.org/10.1201/9780429329487-ch02
https://doi.org/10.1201/9780429329487-ch02
Autor:
Carlos Gañán, Tatsuya Tamai, Ryoichi Isawa, Michel van Eeten, Katsunari Yoshioka, Akira Fujita, Rui Tanabe, Tsutomu Matsumoto
Publikováno v:
ARES
Large botnets made up of Internet-of-Things (IoT) devices have been a steady presence in the threat landscape since 2016. Earlier research has found preliminary evidence that the IoT binaries and C&C infrastructure were only seen for very brief perio
Autor:
Fieke Miedema, Rolf van Wegberg, Arman Noroozian, Bram Klievink, Michel van Eeten, Ugur Akyazi
Publikováno v:
WWW
Proceedings of The Web Conference (WWW)
Proceedings of The Web Conference (WWW)
Many cybercriminal entrepreneurs lack the skills and techniques to provision certain parts of their business model, leading them to outsource these parts to specialized criminal vendors. Online anonymous markets, from Silk Road to AlphaBay, have been
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::51a64fe16954ba0756c2684f77309b70
https://doi.org/10.1145/3366423.3380162
https://doi.org/10.1145/3366423.3380162
Publikováno v:
IEICE Transactions on Communications, E103B(4)
Distributed Denial of Service attacks against the application layer (L7 DDoS) are among the most difficult attacks to defend against because they mimic normal user behavior. Some mitigation techniques against L7 DDoS, e.g., IP blacklisting and load b